Add your picture to Google search results – Rich snippets

Maybe you noticed the fancy Google search results containing profile pictures already. When you don’t have a clue what I mean, you can find an example of a Google Search rich snippet at the top of this article. Pretty neat don’t you think? What are you thinking.. you do want to have the same fancy… Continue reading Add your picture to Google search results – Rich snippets

Accessing your files at home from your office

Assume you are at work and you would like to access your files at home in a secure way. There are many ways to accomplish this, for example by remote desktop. In this article I will unveil another approach namely via SSH (Secure SHell) and mounting your remote home-directory at your computer at work. Example… Continue reading Accessing your files at home from your office

Cisco type 8 and 9 password hashes calculated using Java

In this article I will discuss three types of algorithms used by Cisco to calculate hashes from plain-text passwords, namely: Type 4, Type 5, Type 8 and Type 9. Back in the year 2013, the Type 4 algorithm was proven insecure because of an implementation error. The algorithm does not use PBKDF2 and does not… Continue reading Cisco type 8 and 9 password hashes calculated using Java